Chapter 2 Flashcards

1
Q

A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.

A

dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering ____ means to create a fictitious character and then play out the role of that person on a victim.

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The average phishing site only exists for ____ days to prevent law enforcement agencies from tracking the attackers.

A

3.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whereas phishing involves sending millions of generic e-mail messages to users, ____ targets only specific users.

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ identify individuals within the organization who are in positions of authority.

A

Organizational charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ may reveal the true level of security within the organization.

A

Policy manuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ involves using someone’s personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.

A

social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____

A

social networking sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ means an attacker who pretends to be from a legitimate research firm asks for personal information

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stolen wallets and purses contain personal information that can be used in identity theft. This is known as ____.

A

stealing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using a standard ____ form, attackers can divert all mail to their post office box so that the victim never sees any charges made.

A

change-of-address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The best approach to establishing strong security with passwords is to use a ____

A

password management tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is a program that lets a user create and store multiple strong passwords in a single user database file that is protected by one strong master password.

A

password management application

17
Q

The ____ of 2003 contains rules regarding consumer privacy.

A

Fair and Accurate Credit Transactions Act

18
Q

FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every ____.

A

12 months

19
Q

If a consumer finds a problem on her credit report, she must first send a letter to the credit-reporting agency. Under federal law, the agency has ____ days to investigate and respond to the alleged inaccuracy and issue a corrected report

A

30

20
Q

A ____ is a numerical measurement used by lenders to assess a consumer’s creditworthiness.

A

Credit Score

21
Q

Credit score reports cost about ____.

A

$10

22
Q

use of a telephone call instead of e-mail to contact a potential victim

A

Vishing

23
Q

one type of spear phishing

A

Whaling

24
Q

information entered is observed by another person

A

Shoulder surfing

25
Q

any secret combination of letters, numbers, and/or symbols that serves to validate or authenticate a user by what she knows

A

Password

26
Q

trying to guess a password through combining a systematic combination of characters

A

Brute force attacks

27
Q

means of gathering information for an attack by relying on the weaknesses of individuals

A

Social Engineering

28
Q

WUuAxB2aWBndTf7MfEtm is an example of this

A

Strong Password

29
Q

process that confirms a user’s identity

A

Authentication

30
Q

once an authorized person opens the door then virtually any number of individuals can follow behind and also enter the building or area

A

Tailgating